final Flashcards

1
Q

information

A

data that have been organized so that they have meaning and value to the recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

knowledge

A

data and/or information that have been organized and processed to convey understanding, experience, accumulated learning, and expertise as they apply to a current business problem.

data turns into information which turns into knowledge so it can be used by a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

hardware

A

devices like the professor, monitor, keyboard, and printer; together they accept, process, and display data and information

touchable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

software

A

program or collection of programs that enable the hardware to process data

untouchable, no substance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

data

A

residing in individual databases(a collection of related files and tables that contain specific data) or drawn from multiple sources (mashup)

information without context

describes products, customers, events, activities, and transactions that are recorded, classified, and stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

network

networking

A

connecting system (wireless or wireline) that permits different computers to share resources

group of two or more computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

procedures

A

the instructions for combining the above components to process info and generate the desired output

a component of CBIS; instructions involved in various business processes done by people, not IT services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

expert systems (ES)

A

attempt to duplicate the work of human experts by applying reasoning capabilities, knowledge, and expertise within a specific domain. takes various inputs to try and duplicate a human/decision making.
like artificial human intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Porter’s primary activities of the value chain model

A
  1. inbound logistics (raw materials)
  2. operations (pulling it together)
  3. outbound logistics (retailer/distribution)
  4. marketing/sales (media)
  5. services (make sure customer is still happy; installation and repair)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

porter’s secondary activities of the value chain model

A
  1. the firm’s infrastructure (legal/accounting)
  2. human resources management (personnel/recruiting)
  3. product and technology development (product and process design)
  4. procurement (supplier management)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

strategies for competitive advantage

A
  1. cost leadership strategy
  2. differentiation strategy
  3. innovation strategy
  4. organizational effectiveness strategy
  5. customer orientation strategy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

business IT alignment

A
  1. organizations view IT as an engine of innovation
  2. internal and external customers are important
  3. rotating business and IT professionals across departments and job functions
  4. provide clear overarching goals for everyone
  5. employees understand how the company makes or loses money
  6. create a vibrant and inclusive company culture

the tight integration of the IT function with the organization’s strategy, mission, and goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

infrastructure

A

basic systems of communications, transportation, and energy facilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

business process reengineering (BPR)

A

strategy for making an organization’s business processes more productive and profitable

completely redesigning the business process.
change the way you’re doing things to be more efficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

data governance

A

involves a formal set of business processes and policies that are designed to ensure that data are handled in a specific way

approach to managing information (data) across an entire organization so its not duplicated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

data isolation

A

applications cannot access data associated with other applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

data integrity

A

data meet certain constraints

for example: there are no alphabetical characters in a social security number field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

data hierarchy

A
bit
byte
field
record
data file/table
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

bit

A

the smallest unit of data a computer can process (0 or 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

byte

A

a single character; letter number, or symbol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

field

A

a logical grouping of characters into a word, small group or words, or an identification number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

record

A

a logical grouping of related fields, such as the students name, the courses taken, the date, and grade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

data file/table

A

logical grouping of related records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

primary key

A

a field that uniquely identifies a record so that is can be retrieved, updated, and sorted

example: a student record at JMU would use the unique student’s number on their JACard as the primary key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

foreign key

A

field/group of fields in one table that uniquely identifies a row of another table; used to establish and enforce a link between two tables

a primary key in another table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

big data

A

collection of data so big and complex that it is difficult to manage using traditional database management systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

characteristics of big data

A
  1. volume- machine generated data is generated in much larger quantities than nontraditional data
  2. velocity- rate at which data flow into an organization
  3. variety- big data formats change rapidly, can come from numerous widely varied sources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

data warehouse

A

repository of historical data that are organized by subject to support decision makers in the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

knowledge management

A

process that helps organizations manipulate important knowledge that comprises part of the organization’s memory, usually in an unstructured format

efficient handling of information and resources within a commercial organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

LAN

A

local area network

2 or more devices in limited geographical region, fast, cheap, with distance limitations

a group of computers and associated devices that share a common communications line or wireless link to a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

WAN

A

wide area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

TCP/IP

A

3 basic functions

    1. manages the movement of data packets
    1. sequences the transfer of packets
    1. acknowledges the packets that have been transmitted

4 layers

    1. application layer
    1. transport layer
    1. internet layer
    1. network interface layer

IP: responsible for disassembling, delivering, and re-assembling the data during transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

server

A

provides computing services

a computer, computer program, or device that provides functionality for all other programs or devices called clients

34
Q

clients

A

user computers

request applications, data, and processing

recipient of the data

computers, such as users’ personal computers, that use any of the services provided by servers

35
Q

database

A

repository or data store that is organized for efficient access, search, retrieval, or update

logical grouping of related data files (database tables)

typically organized by fields, records, and files

multiple tables

36
Q

software as a service (SAAS)

A

designed for end users

a service provider hosts the application at its data center and customers access it via a standard web browser

treating software as a utility

37
Q

central processing unit (CPU)

A

part of hardware

manipulates the data and controls the tasks performed by the other components

performs the actual computation or “number crunching” inside any computer

38
Q

primary storage

A

part of hardware

temporarily stores data and program instructions during processing

39
Q

input devices

A

any machine that feeds data into a computer

accept data and instructions and convert them to a form that the computer can understand

example: a keyboard is an input device, whereas a display monitor is an output device

40
Q

output devices

A

present data and information in a form people can understand

41
Q

main memory (primary/main storage)

A

stores 3 types of info briefly

  1. data to be processed by the CPU
  2. instructions for the CPU as to how to process the data
  3. operating system programs that manage various aspects of the computer’s operation

four main types

  1. register
  2. cache memory
  3. random access memory
  4. read only memory
42
Q

random access memory (RAM)

A

holds a software program and small amounts of data for processing

type of computer memory that can be accessed randomly

most common type of memory found in computers and other devices

43
Q

read only memory (ROM)

A

place where certain critical instructions are safeguarded

the storage is non volatile and retains the instructions when the power is turned off, not accessible by you, software protected that cant be destroyed

44
Q

operating system

A

“director” of your computer system’s operations and supervises the overall operation of the computer by monitoring the computer’s status, scheduling operations, and managing input and output processes

provides an interface between the user and hardware

45
Q

ethical issues in IT

A
  • privacy issues: involve collecting, storing, and disseminating information about individuals
  • accuracy issues: involve the authenticity and correctness of information that is collected and processed
  • property issues: involve the ownership and value of information
  • accessibility issues: revolve around who should have access to information and whether they should pay a fee for this access
46
Q

privacy policies/codes

A

an organization’s guidelines for protecting the privacy of its customers, clients, and employees

47
Q

vulnerabilities

A

a weakness in an info system that gives a threat the opportunity to compromise an asset

48
Q

CIA triad

A
  1. confidentiality- preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information; responsibility of “custodians of info”
  2. integrity- guarding against improper information modification or destruction; accurate and reliable data; includes ensuring information non-repudiation and authenticity
  3. availability- ensuring timely and reliable access to info and use of information
49
Q

denial of service (DOS)

A

the unauthorized prevention of access to resources or the delaying of time-critical operations

50
Q

distributed denial of service (DDOS)

A

the use of many compromised systems to cause denial of service for users of the targeted system

multiple attacks

51
Q

phishing

A

attempting to compromise a user by masquerading as a trustworthy entity in electronic communication

52
Q

malware

A

“malicious software”

software or code specifically designed to exploit a computer/the data it contains without the users consent

53
Q

worm

A

usually are triggered by another event to begin spreading

computer program that adversely affects computers and propagate through the network without the users consent

54
Q

enterprise resource planning (ERP) systems

A

info systems that take a business process view of the overall organization to integrate the planning, management, and use of all an organizations resources, employing a common software platform and database

55
Q

access

A

to use, to read data from or write data to a mass storage device; a privilege to use a computer information in some manner; more of a database

56
Q

application software

A

a set of computer instructions that provides more specific functionality to a user

includes database programs like access, word processors, web browsers, and spreadsheets

57
Q

bluetooth

A

chip technology that enables short-range connection (data and voice) between wireless devices

specification used to create small personal area networks, which is a computer network used for communication between computer devices

58
Q

chief info officer (CIO)

A

request applications, data, and processing

recipient of the data

computers, such as users personal computers, that use any of the services provided by the servers

59
Q

column

A

field

column of data containing a logical grouping of characters into a word or a small group of words

example: last name or social security (vertical)

60
Q

crowdsourcing

A

a process where an organization outsources a task to an undefined, generally large group of people in the form of an open call

61
Q

excel

A

spreadsheet program developed by microsoft

these spreadsheets present tables of values arranged in rows and columns to sort information

62
Q

extranet

A

a network that connects parts of the intranets of different organizations and enables business partners to communicate securely over the internet using virtual private networks

business-to-business commerce

63
Q

horizontal market software

A

designed for a wide field

intended for everyone

example: microsoft office

64
Q

http

A

http is the secure version of http, the protocol over which data is sent between your browser and the website that you are connected to

the S at the end of https stands secure; it means all communications between your browser and the website are encrypted

65
Q

internet

A

a major global WAN that connects approx 1 million organizational computer networks

66
Q

intranet

A

a private network that uses internet software and tcp/ip protocols

closed network within an organization

enter through username and password

a local or restricted communications network, especially a private network created using world wibe web software

67
Q

internet protocol (IP) address

A

an assigned address that uniquely identifies a computer on the internet

responsible for disassembling, delivering, and re-assembling the data during the transmission

internet assigned address for a specific site

68
Q

modem

A

device that converts signals from analog to digital and vice versa

a combined device for modulation and demodulation

example: translate/converts between the digital data of a computer and the analog signal of a telephone line

69
Q

off the shelf software

A

low up-front cost, many features, free upgrades, slow to adapt

70
Q

open source software

A

software that is free and available and may be redistributed and modified

software made available in source code form at no cost to developers

71
Q

people

A

the individuals who use hardware and software, interface with it, or utilize its output

only difference between IT and IS is people

72
Q

protocol

A

the set of rules and procedures governing transmissions across a network

procedures and rules need to follow; allows varying software to communicate

73
Q

router

A

a communications processor that routes messages from a LAN to the internet, across several connected LANs, or across a wide area network such as the internet

takes information that arrives through your broadband signal via a modem, decipher it, and deliver it to your computer

choose the best route for the data packet so that you receive the information quickly

74
Q

row

A

record

data is stored horizontally in a row

75
Q

system development lifecycle (SDLC)

A

series of steps, or phases, that provides a model for the development and lifecycle management of an application or piece of software

traditional way of designing and developing a new system

76
Q

security threats

A

passwords, viruses, worms, DOS, phishing,malware, trojan horse, rogue access points, misconfiguration, user error

77
Q

server virtualization

A

uses a computer to allow that server to behaves as if it were multiple servers

example: server could act as windows 10, and server could act as a mac

78
Q

social networking

A

relationships and flows between people, groups, organizations, animals, computers or other information/knowledge processing entities

79
Q

software license

A

allowing an individual or group to use a piece of software

nearly all applications are licensed rather than sold

80
Q

strategic decisions

A

decisions you put into your business that are going to affect the way your company is heading

getting all the stakeholders in the room to look to plan into the future

decisions based on data

81
Q

vertical market software

A

aimed at addressing the needs

software devloped for niche applications or for a specific clientele

designed for a specific industry or market